Hello Bob and all, Thanks for all the nice comments!
>Just to throw something into this that I don't think anyone has mentioned >yet. What if you skipped the rpm database all together and run the verify >against the original RPM from RedHat? For example, "rpm -Vp somefile.rpm"? Well, it makes sense to keep my original purpose in mind. I need the functionality to be able to foil casual attackers against the honeypot (where I replace /bin/rm with my varian of /bin/mv). I highly doubt verification vs RedHat.com will be done by those people. BTW, I am fully aware of LKM rootkits and researching using one of those for the honeypot. However, I still try to stick with Honeynet project philosophy of minimum modification to a system. There is a bunch of ways to trojan Linux system up to and including writing a new OS that looks just like Linux from the command prompt ;-)~ Best regards, -- Anton A. Chuvakin, Ph.D. http://www.chuvakin.org http://www.info-secure.org